Sunteți pe pagina 1din 17

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO.

9, NOVEMBER 2009 5135

A Routing Scheme for the IEEE-802.15.4-Enabled


Wireless Sensor Networks
A. Haffiz Shuaib, Student Member, IEEE, and A. Hamid Aghvami, Fellow, IEEE

Abstract—A wireless sensor network (WSN) has features that Aside from the traditional qualities that have been desired of
fit into several classes of wireless networks (e.g., mesh, ad hoc, a routing protocol, e.g., the ability to quickly converge, be loop
and mobile ad hoc networks) and, at the same time, features that free, be correct, be stable, and be reliable, a routing protocol
are unique to it. These exceptional characteristics place many
demands on the WSN routing protocol. For instance, the routing that has been targeted toward WSNs must also ensure that it is
protocol must assure uniform dissipation of energy across the net- scalable, that the overhead is minimized, and that it supports
work, quickly converge irrespective of the network node density, uniform depletion of energy across the network. In terms of
and be flexible in terms of the routing framework and the route scalability, the sheer density of nodes in a WSN mandates that
computation metric. All of the aforementioned conditions must the network is administered at the level of the cluster, and
be accomplished in an energy-efficient manner. Although several
routing protocols have been proposed for WSNs, most approaches
as a result, routing is better served at the granularity of that
are usually focused on energy-efficient operations. The validity of administrative unit. In this case, clusters along the path from the
this case is undeniable; however, one crucial element is generally data source to the sink must be willing to relay traffic to the sink
assumed or ignored i.e., how one can prevent routing loops in the node. To achieve this case, mechanisms must exist within the
network. In addition to achieving the aforementioned routing ob- cluster that allow for bandwidth reservation, admission control,
jectives, in this paper, we go one step further by expressly defining
and cross-cluster communication.
and thoroughly evaluating mechanisms for loop prevention and
minimization. Our proposed routing scheme leverages the services Coincidentally, the IEEE 802.15.4 specification [2], which is
that were offered by the IEEE 802.15.4 specification to satisfy the implemented on the bulk of the hardware that was targeted at
requirements of a WSN routing protocol. WSNs (e.g., Sun Spots [3], IP-Sensor [4], small autonomous
Index Terms—IEEE 802.15.4, routing, wireless personal area network device (SAND) [5], NanoSensor [6], MicaZ, and IRIS
networks (WPANs), wireless sensor networks (WSNs). [7]), provides the bare mechanisms for cluster formation and
maintenance, admission control, and bandwidth reservation,
I. I NTRODUCTION all of which can be harnessed to achieve the objectives of a
WSN routing protocol. If we will extrapolate from previous

W IRELESS sensor network (WSN) applications can be


grouped into two broad categories: 1) event based and
2) periodic monitoring [1]. Although these application cate-
trends, then it is likely that the IEEE 802.15.4 specification
will become the de facto physical- and MAC-layer standard
for WSNs, just as the IEEE 802.3 and 802.11 standards are for
gories may differ in terms of traffic characteristics and quality- local area networks. With this case, it will be unwise to design
of-service requirements, both categories essentially place the higher layer protocols that are transparent to the services that
same communication architecture on the underlying network. were offered by the specification. To that end, in this paper, we
This architecture is such that communication is generally be- propose a routing framework and mechanism that interacts with
tween WSN nodes and their neighbors or between WSN nodes the IEEE 802.15.4 protocol to assure connectivity in a WSN in
and the sink nodes. Communication between neighbor nodes is an energy-efficient manner.
primarily one that allows for efficient data gathering. For exam- The remainder of this paper is organized as follows. In
ple, data with regard to sensed phenomena can be aggregated or Section II, we discuss the challenges that were placed by
pruned to eliminate duplicates if nodes within the same vicinity the WSN communication architecture on routing protocols. In
cooperatively work with one another. These data are then Section III, we discuss some of the routing protocols that have
transmitted to the sinks, where they are consumed. If these sink been proposed for WSNs. Section IV gives an operational
nodes reside one hop away from the data-gathering nodes, then overview of the IEEE 802.15.4 specification. In Section V, we
the task of the data source to sink transmission is simple. How- present the technical details of the proposed routing mecha-
ever, these sinks may sometimes be located multiple hops away nism. Section VI contains an evaluation of the mechanisms
from the source of the data, thus requiring a routing protocol. in Section V. We use the OPNET network simulation tool for
this purpose. The Appendices follow the conclusion, which is
Manuscript received March 1, 2009; revised May 18, 2009. First published contained in Section VII.
July 14, 2009; current version published November 11, 2009. This work was
supported in part by AMYN Investments Limited, Lagos, Nigeria. The review
of this paper was coordinated by Prof. Y. Xiao. II. O BJECTIVES OF A W IRELESS S ENSOR
The authors are with the Centre for Telecommunications Research, King’s N ETWORK R OUTING P ROTOCOL
College London, WC2R 2LS London, U.K. (e-mail: abdul.shuaib@kcl.ac.uk;
hamid.aghvami@kcl.ac.uk). In this section, we describe the challenges and itemize the
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org. objectives of a WSN routing protocol/mechanism/framework.
Digital Object Identifier 10.1109/TVT.2009.2027440 The discussion in this section is illustrated in Fig. 1.

0018-9545/$26.00 © 2009 IEEE

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
5136 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 9, NOVEMBER 2009

below, signify the quality of a link between any two nodes on a


path, i.e.,

P ath 1 = C −−→ −−→ −−→


14 B 14 A 0 Sink S (1)
P ath 2 = C −−7→ D −−8→ E −−→
14 Sink S. (2)

Now, if Cluster C picks the next hop based on its immediate


link quality, it would pick Cluster B as its next hop to the sink.
Notice that Cluster C cannot infer that the link quality between
Cluster A and the sink is 0. This case is not ideal, because a
route is only as good as its lowest quality hop. The additive-cost
approach, which uses the sum of the link metric along the path,
and the averaging approach, which takes the mean cost on a
path, are also not ideal. Observe that, although Path 1 has a link
with quality 0, it would still sum or average higher than Path 2.
Another challenge deals with dissipation of energy. It has
been shown in [8] and [9] that the lifetime of a WSN is extended
if the rate of energy dissipation across the network is uniform.
For instance, if Path 2 is the preferred path and all routed data
consistently go through this path, the clusters along Path 2 will
die out quicker than those on Path 1. The routing framework
Fig. 1. Cluster-to-sink communication. should recognize and appropriately adapt this case. Note that
uniform energy dissipation also somewhat translates to load
balancing.
A cluster is typically made up of a cluster head, cluster Another solution to the aforementioned uniform energy-
members, and a cluster gateway. The cluster head is the ad- dissipation problem is to have mobile sinks in the network. The
ministrative node for the cluster, and the gateway is the primary main idea here is to have the mobile sink visit multiple locations
relay node for the cluster. Sometimes, the cluster head acts as within the network to collect data, thus saving the energy that
the cluster gateway, whereas at other times, a member of the would have been used to relay data if the sink was remotely
cluster is designated as the gateway. For illustration, we will located and multiple hops away. In [10], the authors showed
assume that the data that were generated in Cluster C needs to that the network lifetime can theoretically be extended by up to
be transmitted to a sink, i.e., Sink S in Fig. 1. In the figure, two 500% when mobile sinks are used. However, this mobile-sink
paths exist from Cluster C to Sink S. The first path, i.e., Path 1, scenario will constitute a major challenge for any WSN routing
goes through Clusters B and A, and the other path, i.e., Path 2, protocol. For example, let us assume that Cluster D announces
goes through Clusters D and E. to the network that it is one hop away from the mobile sink.
The first challenge of a WSN routing protocol is how it Cluster C hears this announcement and accordingly updates
can achieve efficient route propagation i.e., how sinks are its routing table. When the mobile sink moves away from
announced to the network clusters, how routes to the sinks are Cluster D toward Cluster E, Cluster D purges the entries for
maintained, and how nodes that are not gateway nodes or cluster the mobile sink soon after. At the next announcement interval,
heads can be shielded from taking part in the route discovery Cluster C announces that it is two hops away from the mobile
and update processes. sink. Cluster D hears this announcement and updates its routing
The second challenge deals with the twin problem of admis- table, assuming that it is three hops away from the mobile sink
sion control and bandwidth reservation by the relay clusters on through Cluster C. Aside from the obvious issue of loop in the
behalf of other clusters. For instance, if Path 1 in the figure path that was introduced here, this scenario easily leads to the
is the preferred path from Cluster C to Sink S, Cluster B count-to-infinity problem that plagued the Routing Information
should grant Cluster C access by reserving bandwidth for and Protocol (RIP) [11].
admitting traffic from Cluster C if it can manage it. If a cluster Requirements also exist for the support of routing that is
is unwilling or cannot admit traffic from another cluster en geographically oriented and secure. In addition, of course, the
route to a sink, then this information must be reflected in the traditional routing challenges (e.g., scalability, flexibility, loop
route metric, even before the first data packet is transmitted. prevention, fault tolerance, minimal overhead, adaptability to
The idea here is to prevent other clusters from interfering link and topology changes, and how the shortest most reli-
with the internal activities of a relay cluster without its able most energy-efficient path can be chosen) must also be
permission. dealt with.
A WSN routing protocol must infer the quality of all links
on a path from a source to a destination with minimal overhead,
III. R ELATED W ORK
and this condition should be reflected in the route metric that
qualifies that path. To illustrate this challenge, let us assume The routing protocol in this paper is a proactive vector
that the numbers beneath the arrows in (1) and (2), shown routing protocol that relies on a cluster network architecture

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
SHUAIB AND AGHVAMI: ROUTING SCHEME FOR IEEE-802.15.4-ENABLED WIRELESS SENSOR NETWORKS 5137

to achieve its objectives. Thus, the discussion in this section not ideal. In addition, these protocols do not deal with the issue
will be restricted to a representative set of WSN protocols that of mobility; however, an extension of the MintRoute protocol
share similar features with our proposed routing protocol. The called MobiRoute has been proposed for this very purpose.
interested reader should consult [12] and [13] for an exhaustive One common feature of the collection protocols is the use
survey of routing protocols that were targeted at WSNs. of network-layer beacons to propagate route information in the
The first group of protocols are cluster routing protocols. network. As will be discussed in this paper, we adopt a similar
Examples of such protocols are the low-energy adaptive cluster- approach to route propagation, except that this time, we rely on
ing hierarchy (LEACH) protocol [14], the threshold-sensitive the beacon mechanism that has already been provided for by
energy-efficient (TEEN) protocol [15], and the hierarchical the IEEE 802.15.4 specification.
power-aware routing (HPAR) protocol [16]. The aforementioned protocols in this section can be classed
LEACH is an adaptive clustering routing protocol that elects as proactive distance vector routing protocols. The ad hoc on-
a cluster head from a group of homogenous node to act as the demand distance vector protocol, which is a reactive distance
relay node for the cluster for a given time interval. After this vector routing protocol, was originally designed for ad hoc
interval, the cluster head is replaced by one of its peers. As soon networks, but it has been discussed within the context of
as a node is replaced, its elective eligibility diminishes in subse- WSNs in [12] and [22]. The advantages and disadvantages of
quent election rounds. The idea is to spread the energy that was reactive routing protocols are well known. For example, nodes
utilized for relaying data for the cluster among the nodes. Each do not need to maintain path entries to every destination in the
cluster head gathers data from the cluster and directly transmits network, because route paths are requested on demand, thus
these data to the sink. LEACH was designed for scenarios in saving memory space. Associated with this benefit are some
which data are always available to be sent at a fixed rate. TEEN, disadvantages, including the fact that route request messages
which has a similar mechanism to LEACH, was designed for are sent into the network using a broadcast mechanism, which
reactive networks, i.e., networks that immediately transmit data can easily lead to a broadcast storm. The possibility of selecting
upon sensing a phenomenon. The implicit assumption in both a suboptimal path due to limited topological information that
LEACH and TEEN that all cluster heads (and by extension all is available to the node [23] and the delay that was incurred
nodes) can directly reach the sink prevents the network from when trying to acquire a route [24] are factors that should
expanding, and therefore, it cannot cover large regions. be considered when using a reactive protocol. The unique
The HPAR protocol groups each node into a geographical communication architecture of the WSNs makes some of the
zone or cluster. A single node in each zone is periodically concerns that were addressed by reactive routing protocols
selected to estimate the power levels of each node in its zone. redundant. For example, the only significant multihop com-
This estimate is used to compute the amount of energy that munication in a WSN is the communication between the sink
was expended to transmit data out of each corner of the zone. and the data source; thus, the gateway/relay node need not
This information is then broadcast to other zones and is used hold route information to all nodes in a network but to an
for future routing decisions. The idea here is that nodes from optimal number of sinks. To that end, our routing mechanism,
other zones can infer the path that can reliably relay information as will be detailed in this paper, adopts a flexible approach that
using the minimum amount of energy. combines some of the advantages of the proactive and reactive
MintRoute [17], MultiHopLQI [18], the Collection Tree Pro- protocols.
tocol (CTP) [19], Arbutus [20], and MobiRoute [21] are a set of
routing protocols that, as a group, are referred to as collection
IV. O VERVIEW OF THE 802.15.4
protocols. The primary difference in each of these protocols lie
N ETWORK A RCHITECTURE
in how the path cost is computed. For example, in MintRoute,
the computed cost of a path is a function of the ratio of the In this section, we discuss the network architecture of the
number of expected packets and the number of packets that IEEE 802.15.4 specification and its operational overview in
were received on the immediate link. CTP attempts to improve terms of how the clusters are formed and how the shared chan-
upon MintRoute by summing the link costs across all hops to nel is accessed in the beacon-enabled mode. We also discuss
determine the cost of a path. The MultiHopLQI protocol uses how intercluster communications can be achieved using a
the same principle of additive cost for path cost computation combination of the mechanisms that were provided by the
but differs from CTP in the sense that the cost is a function of specification.
the received signal strength compared to using the ratio of the Within the specification, a cluster is referred to as a wireless
expected number of received packets and the number of packets personal area network (WPAN), and the cluster heads are
that were received. referred to as the WPAN coordinators. In the remainder of this
None of the aforementioned collection protocols explicitly paper, we will use the terms WPAN and WPAN coordinator
implements a form of load balancing. Achieving load balancing when referring to a cluster and a cluster head, respectively.
is the primary motivation of the Arbutus collection protocol. It
achieves its objective by using the traffic load on the immediate
A. WPAN Formation Process and the Active/Inactive Periods
links of a relay node as an input to the cost computation
algorithm. Observe that the collection routing protocols use Based on a communications perspective, an IEEE 802.15.4
either an additive or an immediate cost approach for path cost node is functional only if it is associated with a WPAN, either
computation. As discussed in the last section, this approach is as the coordinator or as a member. Typically, at start up, a

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
5138 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 9, NOVEMBER 2009

Fig. 2. SFD interleaving.

node scans the channel looking to receive beacons from WPAN of WPANs within the communication distance of one another
coordinators within its surrounding areas. At the end of a scan, increases, the length of the BI also increases if each SFD will
the node looks for the best beacon in the beacon scan list, be separated in time.
which is usually the beacon from a WPAN that is within its Although outside the scope of this paper, it is worth noting
personal operating space (≤ 10-m radius) and currently accepts that mechanisms exist to mitigate the interference that was
associations. The node proceeds to associate with a WPAN if it caused by other networks, e.g., 802.11, which operates on
is deemed to be suitable. As a part of this process, the WPAN the industrial–scientific–medical band as the IEEE 802.15.4
coordinator assigns a 16-b short address to the associating node. network [27].
All future communications between the WPAN coordinator
and a member are done using this short address. On the other
hand, if none of the beacons is suitable, the node does one of B. Channel Access Mechanisms
the following two approaches, depending on the type of the The SFD can be divided into the contention access period
IEEE 802.15.4 node: 1) a full function device (FFD) or 2) a (CAP) and an optional contention-free period (CFP). In the
reduced function device (RFD). An RFD, which is relatively CAP of any SFD, WPAN members and the coordinator have
resource constrained, might shut down its radio and later try to contend for the medium using a carrier-sense multiple access
again to locate a suitable WPAN. An FFD, upon failing to with collision avoidance (CSMA–CA) mechanism. To transmit
find a suitable WPAN, can proceed to form its own. The during the CFP, WPAN members must have been granted
newly created WPAN identifies itself using a 16-b WPAN ID some guaranteed time slots (GTSs) in the SFD by the WPAN
and begins beacon transmission. Two consecutive transmitted coordinator. These grants are either unsolicited or a result of an
beacons from a single WPAN will be separated by a beacon explicit GTS request that was transmitted by a WPAN member.
interval (BI). If the network operates on the 2.4-GHz frequency In this paper, the CFP is the most pertinent and, as such, will
band with a bit rate of 250 Kb/s, then the duration of the BI (in further be discussed in detail using Fig. 3.
seconds) is shown as follows: According to the standard, the activities of the IEEE 802.15.4
MAC layer are coordinated by an abstract entity known as the
BI = 0.01536 × 2BO (3) next higher layer. This entity receives and processes MAC-
layer commands on behalf of a node. For instance, if a node
where BO, 0 ≤ BO ≤ 15 is referred to as the beacon order.
requires for GTSs, the higher layer computes the number of
As soon as beacon transmission commences, other unassoci-
slots required and sends this information to the MAC layer. The
ated nodes within the vicinity of the WPAN coordinator can
MAC layer appropriately frames this GTS request command,
elect to join the newly formed WPAN. WPAN members are
setting all the required fields, and transmits it on the wireless
only active for a certain period within the BI. This active period
medium. According to the specification, all command frames
is referred to as the superframe duration (SFD). The length of
will be sent using the CSMA–CA mechanism and must be ac-
the SFD is given as
knowledged upon receipt. When a coordinator receives a GTS
SFD = 0.01536 × 2SO (4) request command, it acknowledges the frame and decapsulates
it. The information with regard to the GTS request is then sent
where SO, SO ≤ BO is referred to as the superframe order. to the coordinator’s next higher layer. The coordinator’s next
The SFD of a WPAN begins at the instant that the beacon is higher layer reserves slots in the subsequent SFD based on
transmitted by the WPAN coordinator. The difference between the request and as it deems fit. The information with regard
the SFD and the BI is the time interval in which WPAN nodes to GTS grants are included in the next outgoing beacon. Upon
need to be inactive and can probably go to sleep. the receipt of a GTS grant from the coordinator, the next higher
If multiple WPANs operate on the same frequency band or layer of a node instructs the CFP process to begin transmissions
frequency channel and are within the communication range of as soon as its reserved slot time begins and stops the process
one another, it is mandatory that their SFDs are separated in when it ends. If the number of allocated GTSs is not sufficient,
time. The idea is to prevent one WPAN from interfering with the GTS request process is repeated as aforementioned and as
the active period of another. For instance, if we assume that depicted in the message sequence in Fig. 3. Note that only a
WPANs A–D are within the communication distance of one maximum of seven nodes can be granted GTSs in any SFD.
another, their SFDs could be arranged as shown in Fig. 2. Note
that to maintain the integrity of the SFD boundaries, WPANs
C. Inter-WPAN Communication
A–D must be synchronized with one another. Several solutions
exist to ensure the aforementioned condition, including [25] The standard does not expressly define how inter-WPAN
and [26]. It should be apparent in Fig. 2 that as the number communication is achieved, but it gives room for much

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
SHUAIB AND AGHVAMI: ROUTING SCHEME FOR IEEE-802.15.4-ENABLED WIRELESS SENSOR NETWORKS 5139

Fig. 3. Default GTS message sequence.

flexibility. In [28] and [29], the authors attempt to exploit V. P ROTOCOL D ESCRIPTION AND I MPLEMENTATION
this flexibility to achieve inter-WPAN communication. Two
In this section, we introduce and describe the operational
mechanisms with similar underlying principles were proposed.
mechanism of our routing scheme within the context of what
In the first solution [28], which was referred to as master–slave
is expected of a WSN routing protocol. In addition, contained
bridging, the coordinators act as the relay nodes or bridges on
within this discussion is how our mechanism interacts with
behalf of their respective WPANs. Slave–slave bridging [29],
the IEEE 802.15.4 MAC layer to achieve the WSN routing
on the other hand, shifts the responsibility of relaying data for
objectives. However, before going into the discussion, a few
a WPAN to a node other than the coordinator. To illustrate the
definitions are given in order.
operation of the bridge, we will assume that two WPANs A and
B exist such that traffic from WPAN A needs to go through
WPAN B en route to the sink. A bridge will typically accept
A. Definitions and Notations
data from WPAN A during its SFD and deliver these data to
WPAN B during WPAN B’s SFD. Another bridge will deliver The definitions that follow will act as an aid to understanding
the data from WPAN B to the sink using the same mechanism. the various components of our routing mechanism, which is
The bridge can accept and deliver data using the CAP or CFP described in the next section.
of the WPANs. If the bridge operates during the CAP, then it Definition 1—Neighbor WPAN: If WPANs A and B are
will have to compete for the channel like any other member of within the communication range of one another, then WPAN
the WPAN. As noted in [28], depending on the internal state A is a neighbor of WPAN B, and vice versa. We will denote the
of a receiving WPAN, the bridge’s operation during the CAP set of neighbor WPANs of WPAN X as Nx , and its cardinality
can negatively impact the activities of the WPAN members, or is |Nx |.
the other WPAN members could do the same to the bridge. Definition 2—Out-Neighbor: If WPAN A has a route to a
Although the CFP portion is used for bridge activities, this sink through WPAN B, then WPAN B is an Out-neighbor
negative impact is still possible, because the GTS request of WPAN A for that sink. We will denote the set of Out-
command is only transmitted during the CAP. In addition, the neighbors of WPAN X for sink S as Nx−s−out , and Nx−s−out ∪
fact that the bridge can compete for the channel across multiple Nx = Nx .
WPANs suggests that the bridge is a member of each of those Definition 3—In-Neighbor: Correspondingly, if WPAN A
WPANs. has a route to a sink through WPAN B, then WPAN A is
In this paper, we adopt a different approach to inter-WPAN an In-neighbor of WPAN B for that sink. We will denote the
communication by slightly extending the GTS message se- set of In-neighbors of WPAN X for sink S as Nx−s−in , and
quence in Fig. 3. Here, a relay node, whether it is a coordi- Nx−s−in ∪ Nx = Nx .
nator or another designated node, need not be a member of Definition 4: It is possible that an In-Neighbor n ∈ Nx−s−in
multiple WPANs. The communication across WPANs is strictly for a WPAN X to sink S can also be an Out-neighbor for
done using the CFP, because it aids admission control and WPAN X to sink T, i.e., |Nx−s−in ∩ Nx−t−out | ≥ 0.
bandwidth reservation, which, in turn, provides a mechanism Definition 5—Route Descriptor: A route descriptor contains
for insulating a WPAN from outside activities, if need be. If information with regard to a single route to a sink, and this
a WPAN is saturated and cannot handle traffic that needs to information will include the hop count (HC), the Out-neighbor,
be relayed, this information is reflected in the route metric and the quality of the path to that sink.
that qualifies the path through that WPAN. The details of Definition 6—Route Dscrpt List: The incoming route de-
how we achieve the aforementioned approach are discussed in scriptor list (Route Dscrpt List) RDin−list contains all incom-
Section V-B, because it is an integral component of our routing ing route descriptors, whereas the RDout−list contains all the
mechanism. outgoing descriptors of a relay node.

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
5140 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 9, NOVEMBER 2009

Fig. 4. Route packet structure. (a) Beacon payload format. (b) Route descriptor format.

Fig. 5. WPANs and one sink. (a) Network structure. (b) Outgoing route descriptor.

Definition 7—Forwarding Table: The forwarding table Tf d the neighborhood beacon reception also depends on the update
contains the routes to the sinks and the associated computed interval Λ.
route cost. The structure of the beacon payload is shown in Fig. 4(a).
Definition 8: The inputs to the process that produces The protocol ID (Proto ID) field tells the MAC layer which
the forwarding table are the entries of the incoming Route higher layer owns the content of the beacon payload. The route
Dscrpt List. descriptor count (Route Dscrpt Count) indicates the number of
Definition 9—LQI: The IEEE 802.15.4 specification man- route descriptors in the payload. The maximum number of route
dates that each incoming frame must be stamped with a link descriptors in any beacon payload is eight. The Route Dscrpt
quality indicator (LQI) value. This value indicates the quality List field contains the route descriptors to the known sinks.
of the link at the time of frame reception. According to the The formal structure of a route descriptor is shown in
standard, the LQI value must be an integer that is uniformly Fig. 4(b). The sink WPAN ID (SID) contains the WPAN ID
distributed between 0 and 255, with 255 indicating the highest of the sink. The Out-Neighbor ID (ONID) field contains the
signal quality. Details about how this value is computed are WPAN ID of the Out-Neighbor. The HC contains the node’s HC
contained in Appendix A. from the sink. Finally, the Lowest Path LQI (LPL) field holds
Definition 10—Update Interval: The update interval, which the value of the lowest link LQI on the path from the sink to
we will denote by Λ, is the length of time that must elapse the node.
before a relay node completes the following three tasks: To describe the route-propagation mechanism, consider
1) purges its forwarding table; 2) updates the forwarding table if Fig. 5(a), in which nodes S and A–D are the coordinators for
new information is available; and 3) announces its best routes to their respective WPANs, and the numbers by the bidirectional
sinks to its surrounding WPAN neighbors. The update interval arcs that connect the nodes are the LQI values of the links. At
is in multiples of the BI [see (3)], i.e., Λ = Λco−ef f ∗ BI, time 1 [see Fig. 5(b)], node S, which is the sink for the network,
where Λco−ef f is the update coefficient. Finally, we will denote inserts a payload into the beacon payload section. The beacon
the current update interval by Λcurr . payload Proto ID is set to1 to indicate to the MAC layer that
the payload is for the network/routing layer, and the value of
the Route Dscrpt Count field is set to1 to indicate that only
B. Mechanisms for Achieving WSN Routing Objectives
one route descriptor is contained in the Route Dscrpt List. The
The purpose of this section is to give a technical description contents of this single route descriptor are shown in the first
of our proposed routing mechanism. We do this by juxtaposing row in Fig. 5(b). Notice that the sink puts its address in the
each of its components with the objectives of the WSN routing SID and ONID fields of the descriptor and sets HC = 0. It also
protocols in Section II. sets LP L = 255. The sink then transmits this beacon during its
1) Route propagation: Route propagation is achieved active period or SFD. Node A enables its receiver and gets the
through the insertion of route information into the payload beacon from the wireless stream. It extracts the payload and
section of an outgoing IEEE 802.15.4 beacon once in every adds the route descriptor to its incoming Route Dscrpt List.
update interval Λ. WPANs within the communication distance At time 2, node A fills an outgoing route descriptor with the
of one another know when a neighbor WPAN transmits its values shown in row 2 in Fig. 5(b). This time, the LPL is set
beacon, because they all have to be synchronized to prevent to 20, because the link between Sink S and Node A had an LQI
SFD boundary encroachment (see Section IV-A). A WPAN value of 20, as indicated in Fig. 5(a). HC = 1. This outgoing
coordinator simply enables its receiver when any neighbor descriptor is inserted into the beacon payload, and the beacon
WPAN n ∈ Nx transmits a beacon that contains route infor- is transmitted. Nodes B and D will receive the beacon that was
mation. The receiver is immediately disabled once the beacon transmitted by node A. Both nodes will process the incoming
is received. The coordinator then proceeds to extract the routing descriptor similar to process previously undertaken by node A.
information from the beacon for processing. The frequency of For their outgoing route descriptors, nodes B and D both update

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
SHUAIB AND AGHVAMI: ROUTING SCHEME FOR IEEE-802.15.4-ENABLED WIRELESS SENSOR NETWORKS 5141

the HC to 2, and the ONID is set to the address of node A. Node


B updates the LPL in its outgoing descriptor to 10, whereas
node D leaves the LPL as 20, although the LQI of the link that
connects nodes A and D has a value of 50. Node C will receive
two descriptors to Sink S: one descriptor from node B and
another from node D. We designed the routing protocol such
that, if a node has multiple routes to a sink, only the best route
is included in the outgoing Route Dscrpt List. If other things are
equal, node C will include only the path through node D in its
outgoing Route Dscrpt List, primarily because the LPL on the
path to the sink through D is higher than that of the path through
B. In other words, the routing mechanism takes cognizance of
the quality of all the links on a path to a sink, because the quality
of a path is only as good as the hop on that path with the lowest
link quality. At time 4, node C creates an outgoing descriptor,
with the values shown in the fifth row in Fig. 5(b). This
descriptor is inserted into the next outgoing beacon from C.
2) Loop Avoidance: We use four mechanisms to prevent
or minimize the occurrence of loops in the network. These
mechanisms are itemized and discussed as follows.

1) Lists and table purge. In every update interval Λ, the


forwarding table and the outgoing descriptor list are
purged. If new information is available in the form of new
descriptors in the incoming descriptor list, the forwarding Fig. 6. Loop-prevention algorithm. X is the ID of the node that runs the
algorithm, and YRDi is the ID of the source of RDi . HCx−s is the current
table is populated with this information; otherwise, it is hop count of node X to Sink S.
left empty. The idea here is to prevent the utilization and
propagation of stale information, which minimizes loops that was propagated by node B is temporal. This loop-
within the network. prevention mechanism was added to the routing protocol,
2) Descriptor Reject 1. In Fig. 5, at time 4, node C sends because we found out that, in practice, the speed and
out its descriptor, as shown in the last row in Fig. 5(b). the dwelling time of the mobile sinks can sometimes
Nodes B and D will receive the route descriptor in the negatively impact route convergence.
transmitted beacon of node C, because they are both 4) Descriptor TX limit. For the last loop avoidance mech-
within the communication range of node C. When node anism, sinks are only allowed to propagate route descrip-
D receives node C’s route descriptor, it rejects it, because tors about themselves, i.e., the Route Dscrpt Count is
node D can infer from the ONID of node C’s route always 1 for a sink. For example, consider a mobile sink
descriptor that it is the Out-Neighbor or the next hop for scenario with two sinks: one mobile sink and one static
node C to Sink S. This approach effectively deals with sink. Let us further assume that each sink is within the
the count-to-infinity problem. During this process, node communication distance of the other one such that Sink 1
D adds node C to its In-Neighbor List ND−in for Sink S. knows about Sink 2, and vice versa. Sink 1 propagates
Node B will also reject node C’s route descriptor, because route information about Sink 2, and sink 2 does the
it can infer from the HC field of the descriptor that it is same for Sink 1. Now, if Sink 1 becomes mobile and
closer to the sink than node C and that the descriptor’s moves away from Sink 2, the possibility exists that Sink 1
OID = SID. A descriptor is also rejected by a node X might transmit information about Sink 2, although it is no
if OID ∈ NX . The loop prevention process is captured longer within the communication range of Sink 2, thus
in the algorithm in Fig. 6. propagating incorrect information. The descriptor TX
3) Descriptor Reject 2. Consider another scenario where limit mechanism prevents this instance.
Sink S in Fig. 5(a) is mobile and moves away from node A
toward node B. At the next update interval Λ, node A will 3) Admission Control and Bandwidth Reservation: Band-
no longer have a direct path to Sink S, but node B will. width reservation and admission control across multiple
Now, node A receives a route descriptor from node B, WPANs is accomplished using the modified GTS message
announcing that it is one hop away from the sink. Node A sequence in Fig. 7.
rejects this descriptor and removes Node B from its In- Based on Fig. 5, node C had chosen node D as its Out-
Neighbor list for that sink. At the next update interval Neighbor WPAN to Sink S. Let us now assume that node C has
Λ, node A will accept the route descriptor from node B, traffic that needs to get to Sink S through node D. The process
because node B is no longer an In-Neighbor of node A of admission control and bandwidth reservation by node D on
for Sink S. The idea here is for A to err on the side behalf of node C is explained as follows. Within every update
of caution just in case the validity of the information interval Λ, along with the inclusion of route descriptors, node D

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
5142 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 9, NOVEMBER 2009

Fig. 7. Modified GTS message sequence.

includes GTS grants in its beacon for each of its In-Neighbors member is done using the member’s assigned 16-b short ad-
(a maximum of 7 In-Neighbors). This method is coordinated by dress. To allow for consistency, GTS transactions outside a
node D’s routing process and its higher layer, as shown in Fig. 7. WPAN should be carried out using the 16-b WPAN ID. The
If node C requires traffic to be sent through node D en route to only provision is that the coordinator of WPAN X should never
Sink S, it uses this first unsolicited GTS grant to send a GTS assign a 16-b address that is already in use by any WPAN
request to node D. This GTS request would contain information n ∈ Nx to any of its WPAN members.
about how much traffic node C seeks to route through node D. 4) Route Metric Computation: The relative preference of
Upon receiving this GTS request, node D estimates how much one path over another is based on the computed metric on those
resources would be required to admit node C’s traffic. If paths. Our route metric computation formula is a function of
node D can handle node C’s traffic, node D, in its next active the link quality of the path and the hop distance from a sink,
period/SFD, grants node C the required number of GTSs. The as shown in (5). The higher the metric Cij , the better the route.
second grant is depicted as Grant 2 in Fig. 7. Node C begins We have
transmission to node D at the assigned slot times. On the other
hand, if node D cannot admit traffic on behalf of node C, it sim- (HDij )γ + (LP Lij )ρ
Cij = (5)
ply does not grant node C the second GTS grant. This method 2
assures that the traffic from node C does not interfere with the
where Cij ∈ [0.0, 255.0], HDij ∈ [0, 255] is the hop degree
activities of the WPAN in which node D is the coordinator
from Sink i to node j, and LP Lij ∈ [0, 255] is the value of the
without the permission of node D. In general, if the internal
lowest LQI along the path from Sink i to node j. The hop degree
state of a WPAN is such that it cannot route traffic on behalf
HDij is a function of the HC HCij from a node to a sink such
of any of its WPAN neighbors, it simply does not include GTS
that HDij = 255 − HCij , i.e., the closer a node is to a sink,
grants (either Grant 1 or 2 in Fig. 7) in its outgoing beacons. If
the higher the hop degree becomes. Based the aforementioned
node D cannot admit traffic for node C, then node B might do
condition, we can infer that the HC between a node and a sink
so. In this case, node B should be the preferred Out-Neighbor
can never exceed 255.
for node C to Sink S, and this approach should be reflected in the
In (5), ρ ∈ [0.0, 1.0] and γ ∈ [0.0, 1.0] are the LQI and hop
route metric. How this approach is incorporated into the route
degree exponents, respectively. These exponents are weights
metric computation is discussed in the next section.
that define the relative importance of the hop degree/HC and
If we will contrast the modified message sequence in Fig. 7
the lowest LQI on a path when computing Cij . To show how
with the default in Fig. 3, we would find that the difference
these exponents are applied, assume that two paths (Paths 1 and
lies in how the GTS requests are sent. The default message
2) exist from node A to Sink S. We have
sequence uses the CSMA–CA/CAP channel-access mechanism
to transmit a request, whereas the modified version uses the
P ath 1 = A −−→ −−→ −−→ −−→
50 B 60 C 50 D 70 S
CFP. If the first GTS is not granted (i.e., Grant 1), then there is
no way that a GTS request can be placed across WPANs; hence, P ath 2 = A −−→ −−→ −−→
30 F 20 G 40 S.
bandwidth cannot be reserved, and traffic will not be admitted
from outside the WPAN. In addition, assume that the numbers underneath the arrows
Based on the discussions so far, we see that a coordinator represent the quality of the hop/link.
can assign GTSs to nodes within and outside its WPAN. The Using (5) and setting ρ = 1.0 and γ = 1.0, the route metric
GTS transaction between a WPAN coordinator and its WPAN for Paths 1 and 2 are 150.2 and 136.0, respectively. Based on

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
SHUAIB AND AGHVAMI: ROUTING SCHEME FOR IEEE-802.15.4-ENABLED WIRELESS SENSOR NETWORKS 5143

the computed route metric, Path 1 will be the preferred route TABLE I
SIMULATION PARAMETER VALUES
for node A to Sink S. However, Path 1 will also consume more
energy for transmission than Path 2, because it consists of more
hops to the sink than the other path. This case might not be ideal
for all scenarios. To remedy this case, we make ρ a function of
the HC HCij as follows:
1
ρ= . (6)
HCij

If we recomputed the route metric for both paths while taking


cognizance of (6) and γ = 1, we get 126.83 for Path 1 and 127.4
for Path 2, with Path 2 becoming the preferred path.
Given that Path 2 is the current preferred path, the Out-
Neighbor for node A is node F . The possibility that node F
cannot admit traffic from node A exists. In this case, node A
table with the exact same values. In this paper, the WPAN
would turn to the other path for which node B is the Out-
coordinator also doubles as the WPAN’s gateway or relay node.
Neighbor. If node B has the resources to admit traffic from
Finally, a WPAN, through its coordinator, can choose not
node A, then the path through node B should be the preferred
to participate in the routing process by having the coordinator
path, because the path through node F is as good as useless.
disable its receiver when its neighbor WPANs transmit their
Basically, the inability of an Out-Neighbor to admit traffic en
beacons.
route to a sink should be reflected in the metric that qualifies
that path through that Out-Neighbor. This condition is precisely
what the HD exponent γ in (5) ensures. For instance, if, in the VI. P ERFORMANCE E VALUATION
current update interval Λcurr , an Out-Neighbor to a sink grants
Cross-layer interactions do not lend themselves well to
the first GTS (i.e., Grant 1 in Fig. 7) to an In-Neighbor, then γ
mathematical or analytical modeling, primarily because the
is set to 1, but if it does not, then γ is set to 0, i.e.,
multivariate parameters of the interacting layers must be con-

1.0, if first GTS allocated in Λcurr sidered if the performance characteristics should accurately be
γ= (7) captured. To that end, the routing mechanism in the previous
0.0, otherwise.
section was built atop an IEEE 802.15.4 model, which was
Now, based on the assumption that node F does not grant implemented using the OPNET network simulation tool [36].
GTS to node A but node B does within the current interval We chose this simulation tool, because it enables us to model
Λcurr , γ = 1.0 for Path 1, and γ = 0.0 for Path 2. With ρ = the wireless channel in detail and with a relatively high fidelity.
1/HCij , node A’s route metric CAS for Paths1 and 2 are 126.83 We carried out two sets of evaluations to assess how the rout-
and 3.71, respectively, with Path1 becoming the preferred path. ing mechanism in conjunction with the IEEE 802.15.4 MAC
5) Support for Other WSN Routing Objectives: Certain and physical layers deliver on the objectives expected of a WSN
WSN applications, e.g., agricultural and environmental mon- routing protocol. In the first set of evaluations, we studied how
itoring applications, require that the underlying network can the routing scheme achieves load balancing, uniform energy
retrieve and transmit data in a geographically oriented form. For dissipation, bandwidth reservation, and admission control. We
this case to be possible, the WSN nodes must have some form also look at the contents of the incoming descriptor lists and
of onboard location positioning component, e.g., the GPS-less the forwarding tables of each of the nodes. In the second set of
solutions in [30]–[32]. If this component is present, our routing evaluations, we look at how the mechanism performs on scale,
mechanism can be turned into a geographically oriented proto- particularly in terms of loop control, sink mobility, energy
col simply by choosing the 16-b WPAN ID based on the geo- consumption, and its adaptability to topological changes. We
graphical location of the coordinator. Note that efficient routing do this approach under three different scenarios.
for WSN is done at the granularity of the cluster/WPAN. The plots in the next two sections are average values that
With regard to communication security within the context of were collected with a 95% confidence interval over multiple
the IEEE 802.15.4 specification, see [33]–[35]. simulation runs, each with a different random number seed that
Given the relative limitations of WSN nodes, particularly is uniformly distributed between 0 and 250.
in terms of onboard memory, it is ideal that the size of the The entries in Table I are the simulation parameters that
forwarding table is bounded and kept to a minimum. To prevent are common to both sets of evaluations. The table shows the
forwarding table explosion, we limit the number of entries into nominal transmit power and receiver sensitivity, as set by the
the forwarding table to 16, i.e., two of the best paths each for a IEEE 802.15.4 specification for compliant nodes. Our energy-
maximum of eight distinct sinks. consumption model follows that of Texas Instrument (TI)’s
Note that, if a WPAN coordinator designates one of its CC2430 chip [37], which is currently deployed on the latest
WPAN member as the relay node for that WPAN, the desig- hardware platforms targeted at WSNs. This TI chip expends
nated relay node simply extracts the route information from 24.7 mA for transmission and 27 mA for reception at 3 V. The
its coordinator’s transmitted beacon and updates its forwarding remaining table entries are self explanatory.

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
5144 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 9, NOVEMBER 2009

scenarios were also created, and the energy consumed by the


two Out-Neighbors of WPAN 3 in each of the three scenarios is
shown in Fig. 13.
In the first scenario in Fig. 13, no data were transmitted by
WPAN 3, and the energy that was consumed by WPANs 1 and 2
was mainly due to beacon transmission and reception. In
the second scenario, WPAN 3 routed the 300 frames through
WPAN 1, because WPAN 1 was the preferred Out-Neighbor,
as shown in Fig. 12(b). Thus, the energy that was consumed
by WPAN 1 is higher than what was consumed by WPAN 2.
In the third scenario, WPAN 1 was set to reserve bandwidth
Fig. 8. Three WPANs and one sink. and admit traffic for half of what WPAN 3 requested, after
which, WPAN 1 denied all GTS grants to all its In-Neighbors.
A. Evaluation 1
As a result of this non-GTS grant, the route through WPAN 1
Our first network scenario consisted of four WPANs, as was downgraded based on the hop degree exponent (γ), as
shown in Fig. 8. One of these WPANs was the network sink. In shown in the forwarding table in Fig. 11(b), causing WPAN 2
the scenario, we placed WPAN 3 far enough so that it is outside to become the preferred Out-Neighbor for WPAN 3. This case
the communication range of the sink but within range of WPANs caused WPAN 3 to request bandwidth reservation and traffic
1 and 2. The idea was to have WPANs 1 and 2 act as the Out- admittance from WPAN 2. WPAN 2 granted this request, and the
Neighbors for WPAN 3 to Sink 1. Note that, with the nominal remainder of the data frames was transmitted through WPAN 2
transmit power and receiver sensitivity and under a free-space to SINK 1. Both Out-Neighbors were utilized by WPAN 3 for
path loss model, the maximum communication distance of a routing traffic; thus, the energy consumed by WPANs 1 and 2
node is ∼170 m or less if we factor in the other radio attributes. evened out, as shown in Scenario 3 in Fig. 13.
In Figs. 9 and 10, we show the content of the incoming Route A few points to remember from the aforementioned example
Dscrpt List and the resulting forwarding table for WPANs 1 are given as follows: 1) A WPAN can choose to admit all,
and 2 for the 120th update interval. We can see in Fig. 9 that some, or none of the traffic from an In-Neighbor; 2) if traffic
WPAN 1 has a direct route to the sink and an alternate indirect is not admitted by an Out-Neighbor, it is reflected in the route
route through WPAN 2. A similar deduction about the number metric of the route that goes through that Out-Neighbor; and
of available routes to WPAN 2 can be made in Fig. 10. In 3) Points 1 and 2 allow for load balancing and graceful degra-
Fig. 9(b), the direct route is the preferred route to SINK 1 for dation of the network, which has been shown to increase the life
WPAN 1 as expected, but notice that the preferred route for time of the network [8], [9].
WPAN 2 to SINK 1 is the indirect route through WPAN 1, as
shown in Fig. 10(b). The reason for this case is that the two-
B. Evaluation 2
hop path from the sink through WPAN 1 to WPAN 2 had a better
link quality than the one-hop path from the sink to WPAN 2, as For the set of evaluations within this section, we created three
indicated in the low-LQI entries in Figs. 9(a) and 10(a). Such different scenarios. Each scenario consisted of 20 randomly
a scenario allows for data to transverse the best quality path, deployed WPAN coordinators, five of which were set to be
if longer, at the expense of consuming twice the amount of sinks. These nodes were deployed in a 250 m × 250 m area.
energy required for transmission and reception. If the forward In the first scenario, which we refer to as the Static Topology
error-correction option, as provided for in [38], is set for the scenario, all coordinators were static. In the other two scenarios,
radios of the deployed IEEE 802.15.4 WSN nodes, then these two of the five sinks were set to be mobile. In the Dynamic
nodes can receive and improve on low-quality frames. In this Topology (IN Perimeter) scenario, the trajectories of the mobile
case, there is no reason that the shortest path should not be sink nodes were confined to the perimeter of the deployment
the preferred option. Our nodes can receive low-quality frames area. In the third scenario, which we refer to as the Dynamic
up to a certain degree, given the error correction threshold in Topology (OUT Perimeter) scenario, the trajectories of the
Table I, i.e., the nodes can recover frames that with 20% or mobile sinks were set such that they went out of the deployment
fewer errors. To align the route metric with this result, we set area and, ultimately, out of the communication range of the
the LQI exponent ρ = 1/HCij as discussed in Section V-B-4. other 18 coordinators. The whole idea was to study the impact
The new forwarding table of WPAN 2 is shown in Fig. 11(a), of sink mobility on the routing protocol. For both scenarios with
with the direct path set as the best path to the sink. mobility enabled, the mobile sinks moved at a ground speed
Fig. 12 shows the incoming Route Dscrpt List and the of 10 m/s. There were four stops along the trajectories of the
forwarding table for WPAN 3. The path through WPANs 1 and 2 mobile sinks; the dwell time for the mobile sinks at each stop
tie in terms of the HC to the sink; thus, WPAN 3 chose WPAN 1 was 3 min. For the dynamic scenarios, sink mobility started 3
as its Out-Neighbor to SINK 1 based on the link quality of the min into the simulation.
path through WPAN 1. The connectivity graphs, which are based on the contents
To demonstrate the load balancing, admission control, and of the forwarding tables of the nodes, are shown in Figs. 14
bandwidth reservation capabilities of the protocol, WPAN 3 was and 15(a). The black nodes in the figures represent the nonsink
set to transmit 300 frames of 100 B each to the sink. Three nodes, whereas the white nodes are the sinks. Although the

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
SHUAIB AND AGHVAMI: ROUTING SCHEME FOR IEEE-802.15.4-ENABLED WIRELESS SENSOR NETWORKS 5145

Fig. 9. Route Dscrpt List and forwarding table for WPAN 1 (γ = 1, and ρ = 1). (a) Incoming Route Dscrpt List for Update 120. (b) Forwarding table for
Update 120.

Fig. 10. Route Dscrpt List and forwarding table for WPAN 2 (γ = 1, and ρ = 1). (a) Incoming Route Dscrpt List for Update 120. (b) Forwarding table for
Update 120.

Fig. 11. New forwarding tables for Update 120 for WPANs 2 and 3. (a) Forwarding table for WPAN 2 (γ = 1, and ρ = 1). (b) Forwarding table for WPAN 3
(ρ = 1).

Fig. 12. Route Dscrpt List and forwarding table for WPAN 3 (γ = 1, and ρ = 1). (a) Incoming Route Dscrpt List for Update 120. (b) Forwarding table for
Update 120.

communication range (i.e., >170 m). As a result, the average


number of sinks known per WPAN coordinator was lower for
the OUT Perimeter scenario than for the other two scenarios, as
shown in Fig. 15(b), which is a plot of the average number of
known sinks versus the update coefficient. Note that the update
coefficient Λco−ef f defines the duration of the update interval
(see Definition 10). For example, with Λco−ef f = 5 and with
the BO value shown in Table I, the length of the update
interval Λ is 2.5 s (i.e., the route descriptors are propagated
and received, and forwarding tables are purged and updated
every 2.5 s). Correspondingly, if Λco−ef f = 50, then Λ = 25 s.
Note that the routing protocol is disabled if Λco−ef f = 0. With
the routing protocol disabled, WPAN coordinators cannot reach
the sinks, because the network would not be connected. The
Fig. 13. Energy consumption for WPANs 1 and 2.
average number of known sinks, as shown in Fig. 15(b), is con-
sistent with what was expected for each of the three scenarios.
nodes had multiple routes to each sink (6.4 on the average), Note that consistency is the first of the two indicators of route
the plots in the figures only show the routes with the lowest HC convergence (the second indicator will be discussed shortly).
to the sinks. In the OUT perimeter scenario, as the sinks steadily moved
For the static scenario, we can see that the network is fully away from the deployment area, WPAN coordinators at one
connected. For both Dynamic Topology scenarios, Sinks 1 and edge of the deployment area had to increasingly depend on
4 were the mobile sinks. The initial and final positions of the the coordinators at the opposite edge to reach the mobile sinks.
mobile sinks for the Dynamic Topology scenarios can visually Thus, the mean HC from WPAN coordinators to the sinks was
be inferred by comparing Figs. 14(b) and 15(a) with Fig. 14(a). higher for the OUT Perimeter scenario compared with the other
In the IN Perimeter scenario, the links with the dotted lines two scenarios, as shown in Fig. 16(a). This increased HC for
were the new links formed as a result of sink mobility. For the the OUT perimeter scenario is more clearly shown in the HC
OUT Perimeter scenario, notice that none of the nodes had a frequency distribution of the network in Fig. 16(b), where its
connection to Sinks 1 and 4, because they are clearly out of the tail pulls outward, with at least one instance where a node had a

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
5146 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 9, NOVEMBER 2009

Fig. 14. Connectivity graphs. (a) Static scenario. (b) IN Perimeter scenario.

Fig. 15. Connectivity graph and average number of known sinks. (a) OUT Perimeter scenario. (b) Average number of known sinks.

Fig. 16. Hop counts to sinks. (a) Mean hop count to sinks. (b) Hop count frequency frequency distribution (Λco−ef f = 5).

path with eight hops to a sink. In addition, based on the figure, assures that a loop introduced into the network at any time does
the coordinators in the Static scenario were a maximum of three not unboundedly grow during the operation of the network. The
hops away from any sink at any time. This maximum HC for the stability of a routing protocol is the second indicator of route
IN perimeter scenario was 4. convergence. Fig. 16(a) and (b) implicitly convey the stability
A system is said to be stable if it has properties that assure of our routing protocol. For instance, the fact that the mode
that errors introduced into the system at one time do not for all three plots is 2 in Fig. 16(b) indicates that there are no
unboundedly grow at later times [39]. If the system in question perpetual loops in the network, irrespective of the topological
is a routing protocol, then a stable routing protocol is one that changes due to sink mobility. For an unstable routing protocol,

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
SHUAIB AND AGHVAMI: ROUTING SCHEME FOR IEEE-802.15.4-ENABLED WIRELESS SENSOR NETWORKS 5147

Fig. 17. Energy expended in the network. (a) Network energy consumption. (b) Energy consumed versus the number of sinks (Static scenario; Λco−ef =
10, 20 WPANs).

Fig. 18. Network life time and average time to converge. (a) Network life time (in years). (b) Average time to converge (in seconds).

the frequency of the higher HCs would have been much higher, the amount of energy required for reception and transmission
which is generally an indication of loops in the network, similar of beacons, as depicted in Fig. 17(b). The plot in Fig. 17(b)
to the case with the count-to-infinity problem associated with reaches its asymptotic level when the number of deployed sinks
RIP [11]. is greater than or equal to 8. This case is a result of the length
The following two cost metrics are associated with route of the Route Dscrpt Count field in Fig. 4(a), which restricts the
convergence (consistency + stability): 1) the energy expended number of descriptors in any beacon to a maximum of 8.
to achieve convergence and 2) the time taken to converge. In The lifetime of a wireless network is generally defined as
Figs. 17 and 18, we present the energy that was consumed in the the length of time for which the network functions as expected
network for the simulation duration, the estimated life time of before becoming unusable. For the energy-constrained WSN,
the network, and the average time to converge as a function of the network becomes unusable when all or a subset of the
the update coefficient. Based on the plots in Fig. 17(a), we see nodes, particularly those tasked with relaying data, run out of
that when the routing protocol was disabled (i.e., Λco−ef f = 0), energy. To that end, based on the rate of energy consumption in
the network consumed the least amount of energy. With the Fig. 17(a), we estimated the network lifetime as a function of
routing protocol enabled (i.e., Λco−ef f > 0), we see that the the update coefficient. For instance, when the update coefficient
higher the update coefficient is, the lower the energy consumed was 10 in Fig. 17(a), the energy that was consumed in the
becomes. Fig. 17(a) expresses that the less frequent the route network was 10.84 J (Static scenario). This result translates to
updates, the lower the energy consumed. As shown in the 0.54 J apiece for each of the 15 WPAN coordinators and the
figure, the energy that was consumed in the OUT perimeter five sinks for a simulation duration of 20 min. At that rate,
scenario was slightly lower than those of the other two the daily consumption is ∼ 39 J per node. Based on the total
scenarios. The reason for this case is that the higher the number battery capacity in Table I, the nodes can last for ∼ 277 days or
of deployed sinks [see Fig. 15(b)], the higher the number of ∼0.76 year before running out of energy. As shown in
route descriptors in the beacon payload, which increases the Fig. 18(a), when the routing protocol is disabled, the nodes
size of the overall beacon itself, hence, a slight increase in can last for about 4.3 years. We will use this result as the

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
5148 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 9, NOVEMBER 2009

Fig. 19. Average time to converge and energy expended per WPAN (five sinks; Λco−ef f = 5). (a) Average time to converge (in seconds). (b) Energy expended
per WPAN.

Fig. 20. Average end-to-end delay and delivery ratio. (a) Average end-to-end Delay (in seconds). (b) Average delivery ratio.

upper bound for the lifetime of the network. With the update used in its computation. In Fig. 19(a), we show that increasing
coefficient set to 5, the nodes only last for about half a year, the number of deployed WPANs has the same impact on the
but as we increased the update coefficient, the lifetime of the convergence time as an increase in the update interval, as
network steadily inched toward the lifetime upper bound. shown in Fig. 18(b). One immediate benefit of having a high
It might seem like a good idea to extend the lifetime of the |Nx | value is that the network is robust, fault tolerant, and
network by simply having a larger update interval or coefficient, connected, because a single WPAN will typically have multiple
but having a larger update interval also means that the network routes through its neighbor WPANs to any number of sinks.
would be less reactive to topological changes, because the However, this benefit comes at the cost of an increase in energy
frequency of route propagation and route updates are defined consumption [see Fig. 19(b)], because a WPAN, e.g., WPAN
by the update interval (see Definition 10). For instance, notice X, will have to enable its radio to receive route beacons from
that the average time to converge is higher for larger values of all Nx in every update interval to maintain high connectivity.
the update coefficient, as shown in Fig. 18(b). It suffices to say In Appendix B, we derive an equation that optimizes the
that, if a WSN topology is one that frequently changes, then a energy consumption in the network as |N x| increases without
lower update coefficient should be chosen for that network, and adversely affecting connectivity.
the converse should be the case if the topology is expected to To study the impact of the update coefficient on the delivery
be generally less dynamic. ratio and the data end-to-end delay for all three scenarios, we
Another factor that indirectly affects the convergence time sent 300 data frames of 100 B each from WPAN 1 [circled
of the routing protocol is the number of WPANs deployed in black node in Figs. 14 and 15(a)] to mobile Sink 4. The Out-
the network, assuming that the size of the deployment area is Neighbors to Sink 4 for WPAN 1 were set to only assign enough
kept constant. In Section IV-A, we mentioned that the length GTSs to transmit 50 frames in every update interval. This condi-
of the BI should be directly proportional to the number of tion meant that the more frequent the update interval becomes,
deployed WPANs |Nx | within the communication distance of the more the GTSs allocated per unit time are, and therefore, the
one another if we need to prevent inter-WPAN interference. faster the traffic travels. The impact of this result is captured in
Therefore, by implication, an increase in |Nx | increases the Fig. 20(a), where we see a steady increase in the average end-
update interval, because the BI is one of the two parameters to-end delay as we increase the update coefficient. Notice that

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
SHUAIB AND AGHVAMI: ROUTING SCHEME FOR IEEE-802.15.4-ENABLED WIRELESS SENSOR NETWORKS 5149

the end-to-end delay for the OUT Perimeter scenario was higher It is instructive to restate here that the standard sets the
than that of the other two scenarios when Λco−ef f > 15. This nominal transmit power to 0 dBm and the receiver sensitivity
case is a direct result of the increased HC between the WPANs to −85 dBm.
and Sink 4, because Sink 4 moved out of the deployment Equation (8) meets the first condition, i.e.,
perimeter. In terms of the delivery ratio, the Static and IN
perimeter scenarios performed better than the OUT perimeter L = 255 + 3 ∗ P rxdBm (8)
scenario, as shown in Fig. 20(b). The primary reason for this
where P rxdBm is the power (in decibel–milliwatts) of a re-
result was that, for all scenarios except the OUT perimeter
ceived frame.
scenario, the mobile sink was always within the deployment
For example, if we assign P rxdBm = 0, we see that the equa-
area. For the OUT perimeter scenario, observe a gradual drop
tion gives a value of L = 255; conversely, if we set P rxdBm =
to 0 in the delivery ratio as the update interval increased. This
−85, we get L = 0. With (8), the value of L for every other
case was a direct result of GTSs not being quickly allocated to
received signal power between the receiver sensitivity and
data such that the data will reach the mobile sink before leaving
the nominal transmit power is effectively bounded within the
the deployment perimeter.
interval [0, 255].
In addition, an equation that estimates data traffic delay
To conform with the second mandate, we introduce (9), i.e.,
and the reaction time to topological changes subject to the
protocol configuration (e.g., the number of GTSs allocated 
L , if L − L < 0.5
to data traffic) and the network deployment configuration is LQI = (9)
L, otherwise.
derived in Appendix B.
To explain this case, let us assume that P rxdBm = 65.5,
which gives L = 58.5. This value of L is invalid and might
VII. C ONCLUSION
have to be truncated to meet the requirement. What we did
In this paper, we have proposed a routing scheme that was to round the L value downward or upward, depending on
interacts with the IEEE 802.15.4 MAC- and physical-layer whether the number after the decimal point was ≥ 5 or < 5.
specification to achieve the objectives of a WSN routing If the number after the decimal point is ≥ 5, we round upward,
protocol. and we did the opposite when the value was <5, as shown in (9).
So far, we have technically demonstrated the following In addition, in the case where P rxdBm = 65.5 and L = 58.5,
five cases: the LQI becomes 59.
1) how the route information is propagated through the
use of route descriptors, which are contained within the
A PPENDIX B
IEEE 802.15.4 beacons;
O PTIMAL E NERGY C ONSUMPTION
2) how admission control and bandwidth reservation can
V ERSUS A CCEPTABLE D ELAY
be achieved across clusters/WPANs by simply extend-
ing the GTS message sequence of the IEEE 802.15.4 In this section, we derive two equations that can be used
specification; to estimate the amount of energy that was consumed in the
3) how loops can be prevented or minimized using route network, the delay that was experienced by data traffic, and
descriptor rejects and descriptor transmission limitation; the reaction time to topological changes subject to the network
4) how the routing metric can be used to reflect the highest configuration.
quality path, the shortest path, or a combination of both There are three components that contribute to the energy E
by simply manipulating the LQI and the hop degree that was consumed in the network as a result of the proposed
exponents; routing mechanism. The first component is the number of route
5) how support for uniform energy dissipation in the net- descriptors S in a beacon. As mentioned in the main body of
work is achieved. this paper, the higher the number of route descriptors in the
We have shown through thorough evaluation that the pro- beacon is, the larger the beacon becomes, and the more the
posed routing scheme is flexible, adapts to topological changes, energy that is expended to transmit and receive these beacons
is stable, and can achieve a high degree of sink connectivity. [see Fig. 17(b)]. Note that S ≤ 8, as allowed by the Route
Dscrpt Count field (see Fig. 4).
The second component is the number of known neighbor
A PPENDIX A
WPANs, i.e., |Nx |. As shown in Fig. 19(b), the energy that was
LQI C OMPUTATION
consumed by a node partaking in the routing process is directly
The IEEE 802.15.4 specification states that the LQI com- proportional to its value of |Nx |.
putation algorithm should use the received signal power of a The third component, which is the length of Λ, magnifies or
frame, its signal-to-noise ratio, or a combination of both as minimizes the impact of the other two components on E, as
input. The standard mandates the following two conditions: discussed in Section VI-A.
1) The LQI value must be bounded within the interval [0, 255], If we define E as a vector E = (e) and define the vector
with 255 being the highest quality signal and 0 being the lowest, C = (S, |Nx |), then a change in the vector C would also cause a
and 2) the LQI value must be an integer value that is uniformly change in the vector E. For instance, C  = (S + s, |Nx | + nx )
distributed within this interval. will cause the change E  = (e + ε).

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
5150 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 58, NO. 9, NOVEMBER 2009

Given the linear relationship between E and C, (10) is The task of the network implementer is to find that the
derived as follows: network configuration, among other things, meets the required
objective in terms of the energy budget and delay constraints.
 
1 s Both equations help in this task.
(ε) = (a11 a12 ) (10)
Λ nx
R EFERENCES
where a11 = ∂e/∂S, and a12 = ∂e/∂|Nx |. The elements aij [1] K. Murray, A. Timm-Giel, M. Becker, C. Guo, R. Sokullu, and
depend on the energy consumption model of the hardware D. Marandin, “The European Network of Excellence CRUISE application
platform and can empirically be derived. Equation (10) can framework and network architecture for wireless sensor networks,” in
Proc. IEEE Globecom Workshops, Nov. 2007, pp. 1–6.
be used by the network implementer to estimate how much [2] LR-WPAN, Wireless medium access control (MAC) and physical layer
a chosen value of |Nx | or S affects the energy that was (PHY) specifications for low-rate wireless personal area networks
consumed under different deployment scenarios. An increase (WPANs), 2006, IEEE Tech. Rep.
[3] Sun-Spots, 2009. [Online]. Available: http://www.sunspotworld.com/
in S assures that multiple sinks are known to a WPAN, which docs/general-faq.php
increases connectivity, but this case also increases E. Similarly, [4] IPsensor, 2009. [Online]. Available: http://www.archrock.com/
an increase in |Nx | increases E while also increasing the [5] M. Ouwerkerk, F. Pasveer, and N. Engin, “SAND: A modular applica-
tion development platform for miniature wireless sensors,” in Proc. Int.
connectivity and fault tolerance of the network. Although the Workshop Wearable Implantable BSN, Apr. 2006, pp. 166–170.
effects of the S component on the E value is bounded (i.e., [6] NanoSensor, 2009. [Online]. Available: http://www.sensinode.com
S ≤ 8), |Nx | is not. However, the impact of |Nx | on E can [7] Xbow, 2009. [Online]. Available: http://www.xbow.com/
[8] V. Mhatre, C. Rosenberg, D. Kofman, R. Mazumdar, and
be reduced without affecting connectivity and fault tolerance N. Shroff, “A minimum-cost heterogeneous sensor network with a
if the coordinator of a WPAN, e.g., WPAN X, periodically lifetime constraint,” IEEE Trans. Mobile Comput., vol. 4, no. 1, pp. 4–15,
whenever any WPAN n ∈ Nx that
leaves its receiver disabled  Jan./Feb. 2005.
[9] M. Yarvis, N. Kushalnagar, H. Singh, A. Rangarajan, Y. Liu, and S. Singh,
satisfies {n : n ∈ Nx−u−in n ∈ / Nx−t−out , u = t} transmits “Exploiting heterogeneity in sensor networks,” in Proc. IEEE 24th Annu.
its beacon (see Definitions 2–4). Joint Conf. INFOCOM, Mar. 2005, vol. 2, pp. 878–890.
The delay that was experienced by data traffic on the path [10] J. Luo and J.-P. Hubaux, “Joint mobility and routing for lifetime elonga-
tion in wireless sensor networks,” in Proc. IEEE 24th Annu. Joint Conf.
to a sink and the time delay to react to topological changes INFOCOM, Mar. 2005, vol. 3, pp. 1735–1746.
can be represented by a vector D = (d), which is affected by [11] A. S. Tanenbaum, Computer Networks. Upper Saddle River, NJ: Pearson
three components. The first component is the HC H from a data Educ., 2003, pp. 359–360.
[12] J. N. Al-Karaki and A. E. Kamal, Handbook of Sensor Networks: Com-
source to a sink. The closer a data source is to a sink, the lower pact Wireless and Wired Sensing Systems. Boca Raton, FL: CRC, 2005,
the value of H, and therefore, the lower the value of D. The pp. 116–138.
second component G is the number of GTSs granted to traffic [13] K. Akkaya and M. Younis, “Survey of routing protocols in wireless sensor
networks,” Ad Hoc Netw., vol. 3, no. 3, pp. 325–349, May 2005.
as it transverses the path from the source to the destination. [14] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An application-
The more the GTSs G granted by Out-Neighbors along a path, specific protocol architecture for wireless microsensor networks,” IEEE
the faster the traffic travels, and hence, there is a reduction Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670, Oct. 2002.
[15] A. Manjeshwar and D. Agrawal, “TEEN: A routing protocol for enhanced
in the value of D.1 The third component Λ multiplies the impact efficiency in wireless sensor networks,” in Proc. 15th Int. Parallel Distrib.
of D on the network, as shown in Fig. 18(b). In essence, the Process. Symp., Apr. 2001, pp. 2009–2015.
vector D = (d) is affected by another vector T = (H, G) such [16] Q. Li, J. Aslam, and D. Rus, “Hierarchical power-aware routing
in sensor networks,” in Proc. DIMACS Pervasive Netw. Workshop,
that a change in T will cause a change in D, i.e., T  = (H + h, May 2001.
G − g) will cause a change D = (d + δ). One equation similar [17] A. Woo, T. Tong, and D. Culler, “Taming the underlying challenges of
to (10) is derived as follows: reliable multihop routing in sensor networks,” in Proc. 1st ACM SenSys,
2003, pp. 14–27.
  [18] MultiHopLQI. [Online]. Available: http://www.tinyos.net/tinyos-1.x/tos/
h lib/MultiHopLQI/
Λ (δ) = (b11 b12 ) (11) [19] R. Fonseca, O. Gnawali, K. Jamieson, S. Kim, P. Levis, and A. Woo, The
−g collection tree protocol (CTP). [Online]. Available: http://www.tinyos.net/
tinyos-2.x/doc/txt/tep123.txt
[20] D. Puccinelli and M. Haenggi, “Arbutus: Network-layer load balanc-
where b11 = ∂d/∂H, and b12 = ∂d/∂G. The elements bij in ing for wireless sensor networks,” in Proc. IEEE WCNC, Apr. 2008,
(11) can empirically be derived based on the WSN deployment pp. 2063–2068.
configuration and the traffic characteristics. [21] J. Luo, J. Panchard, M. Piorkowski, M. Grossglauser, and J.-P. Hubaux,
“Mobiroute: Routing towards a mobile sink for improving lifetime
Aside from Λ, there are several subtle relationships between in sensor networks,” in Proc. 2nd IEEE/ACM DCOSS, Jun. 2006,
(10) and (11). For instance, if WPAN X has multiple paths to a pp. 480–497.
sink U , i.e., with a higher number of elements in Nx−u−out ⊂ [22] C. Gomez, P. Salvatella, O. Alonso, and J. Paradells, “Adapting AODV for
IEEE 802.15.4 mesh sensor networks: Theoretical discussion and perfor-
Nx , then there is a higher probability of having a high G value mance evaluation in a real environment,” in Proc. Int. Symp. WoWMoM,
and, hence, a reduction in D. However, an increase in the 2006, pp. 159–170.
cardinality of Nx−u−out also increases the cardinality of Nx , [23] H. Cheng and J. Cao, “A design framework and taxonomy for hybrid
routing protocols in mobile ad hoc networks,” Commun. Surveys Tuts.,
which, in turn, increases E. vol. 10, no. 3, pp. 62–73, Quarter 2008.
[24] P. Samar, M. R. Pearlman, and Z. J. Haas, “Independent zone routing:
an adaptive hybrid routing framework for ad hoc wireless networks,”
IEEE/ACM Trans. Netw., vol. 12, no. 4, pp. 595–608, Aug. 2004.
1 Note that the G component does not affect the reaction time to topological [25] Zigbee-Alliance, Zigbee Specifications, 2007. [Online]. Available: www.
changes, because the route-propagation mechanism does not rely on GTSs. zigbee.org

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.
SHUAIB AND AGHVAMI: ROUTING SCHEME FOR IEEE-802.15.4-ENABLED WIRELESS SENSOR NETWORKS 5151

[26] A. Koubaa, A. Cunha, and M. Alves, “A time-division beacon schedul- A. Haffiz Shuaib (S’08) received the B.Sc. degree in
ing mechanism for IEEE 802.15.4/Zigbee cluster-tree wireless sensor computer science from the Ambrose Alli University,
networks,” in Proc. 19th ECRTS, Jul. 2007, pp. 125–135. Ekpoma, Nigeria, in 2003 and the M.Sc. (top 5% of
[27] R. Musaloiu-E and A. Terzis, “Minimizing the effect of Wi-Fi interference the class) degree in mobile and high-speed telecom-
in 802.15.4 wireless sensor networks,” Int. J. Sensor Netw., vol. 3, no. 1, munications networks from Oxford Brookes Univer-
pp. 43–54, Dec. 2007. sity, Oxford, U.K. in 2005. He is currently pursuing
[28] J. Misic, “Analysis of slave–slave bridging in IEEE 802.15.4 the Ph.D. degree with the Centre for Telecommu-
beacon-enabled networks,” IEEE Trans. Veh. Technol., vol. 57, no. 3, nications Research (CTR), King’s College London,
pp. 1846–1863, May 2008. London, U.K.
[29] J. Misic, C. Fung, and V. Misic, “On bridge residence times in Prior to joining the CTR in 2006, he was a Soft-
master–slave connected 802.15.4 clusters,” in Proc. 20th Int. Conf. AINA, ware Developer with the Nigerian financial sector.
Apr. 2006, vol. 2, pp. 286–290. In 2007, he led the European Network of Excellence Creating Ubiquitous
[30] N. Bulusu, J. Heidemann, and D. Estrin, “GPS-less low-cost outdoor Intelligent Sensing Environments Work Package (CRUISE NoE D113.3) on
localization for very small devices,” IEEE Pers. Commun., vol. 7, no. 5, future needs, research strategy, and visionary applications for sensor networks.
pp. 28–34, Oct. 2000.
[31] N. B. Priyantha, A. Chakraborty, and H. Balakrishnan, “The cricket
location-support system,” in Proc. ACM Mobicom, Boston, MA, 2000,
pp. 32–43.
[32] A. Savvides, C.-C. Han, and M. B. Strivastava, “Dynamic fine-grained
localization in ad hoc networks of sensors,” in Proc. ACM Mobicom, 2001, A. Hamid Aghvami (M’87–SM’91–F’05) received
pp. 166–179. the M.Sc. and Ph.D. degrees from the Univer-
[33] J. Misic, F. Amini, and M. Khan, “Performance implications of peri- sity of London, London, U.K., in 1978 and 1981,
odic key exchanges and packet integrity overhead in an 802.15.4-beacon- respectively.
enabled cluster,” Int. J. Sensor Netw., vol. 3, no. 1, pp. 38–42, Dec. 2007. In 1984, he joined the academic staff of King’s
[34] Y. Xiao, H.-H. Chen, B. Sun, R. Wang, and S. Sethi, “MAC security College London, where he was promoted to Reader
and security overhead analysis in the IEEE 802.15.4 wireless sensor in 1989, became a Professor of telecommunications
networks,” EURASIP J. Wireless Commun. Netw., vol. 2006, no. 2, p. 81, engineering in 1993, and is currently the Director
Apr. 2006. of the Centre for Telecommunications Research. He
[35] Y. Xiao, S. Sethi, H.-H. Chen, and B. Sun, “Security services and carries out consulting work on digital radio commu-
enhancements in the IEEE 802.15.4 wireless sensor networks,” in Proc. nications systems for both British and international
GLOBECOM, Nov./Dec. 2, 2005, vol. 3, pp. 1176–1800. companies. He is the author of more than 500 technical papers and has given
[36] OPNET, 2009. [Online]. Available: www.opnet.com invited talks on various aspects of personal and mobile radio communications
[37] “A true system-on-chip solution for 2.4 GHz IEEE 802.15.4/Zigbee and courses on the subject worldwide.
(Rev. F),” Chipcon Products From Texas Instruments, 2008. [Online]. Prof. Aghvami is a Fellow of the Royal Academy of Engineering and the
Available: http://focus.ti.com/lit/ds/symlink/cc2430.pdf Institution of Electrical Engineers. From 2001 to 2003, he was a Member of the
[38] LR-WPAN, Part 15.4—Wireless medium access control (MAC) and Board of Governors of the IEEE Communications Society. He is a distinguished
physical layer (PHY) specifications for low-rate wireless personal area Lecturer of the IEEE Communications Society and has been a Member, Chair-
networks (WPANs) amendment 1: Add alternate PHYs, 2007. man, and Vice Chairman of the technical program and organizing committees
[39] L. N. Trefethen, The Princeton Companion to Mathematics. Princeton, of several international conferences. He is also the Founder of the International
NJ: Princeton Univ. Press, 2008, pp. 604–615. Conference on Personal, Indoor, and Mobile Radio Communications.

Authorized licensed use limited to: PSN College of Engineering and Technology. Downloaded on July 28,2010 at 12:02:34 UTC from IEEE Xplore. Restrictions apply.

S-ar putea să vă placă și